A secure distributed ledger for transactive energy: The Electron Volt Exchange (EVE) blockchain S Saha, N Ravi, K Hreinsson, J Baek, A Scaglione, NG Johnson Applied Energy 282, 116208, 2021 | 35 | 2021 |
A novel scheme to prevent MAC layer misbehavior in IEEE 802.11 ad hoc networks F Shi, JJ Baek, J Song, W Liu Telecommunication Systems 52 (4), 2397-2406, 2013 | 24 | 2013 |
Wi Not Calling: Practical Privacy and Availability Attacks in Wi-Fi Calling J Baek, S Kyung, H Cho, Z Zhao, Y Shoshitaishvili, A Doupé, GJ Ahn Annual Computer Security Applications Conference (ACSAC ’18), San Juan, PR …, 2018 | 12 | 2018 |
An Improved Brain Storm Optimization with Learning Strategy W Hong, L Jia, Y Wenjie, N Ben, J Baek The International Conference on Swarm Intelligence (ICSI 2017), 2017 | 11 | 2017 |
DyPolDroid: Protecting against permission-abuse attacks in android CE Rubio-Medrano, PKD Soundrapandian, M Hill, L Claramunt, J Baek, ... Information Systems Frontiers 25 (2), 529-548, 2023 | 7 | 2023 |
Secure pre-authentication schemes for fast Handoff in proxy mobile IPv6 J Baek Journal of information and communication convergence engineering 14 (2), 89-96, 2016 | 6 | 2016 |
A Comparison of Heuristic Algorithms for Bus Dispatch W Hong, Z Lulu, L Jia, Y Chen, L Ya, J Baek The International Conference on Swarm Intelligence (ICSI 2017), 2017 | 4 | 2017 |
A novel pre-authentication scheme based on fast channel switching in IEEE 802.11 WLANs JJ Baek, SH Seo, F Shi, JS Song EURASIP Journal on Wireless Communications and Networking 2012, 1-15, 2012 | 4 | 2012 |
A WLAN handoff scheme based on selective channel scan using pre-collected AP information for VoIP application SR Kim, KJ Kim, JJ Baek, JS Song 2009 International Conference on Innovations in Information Technology (IIT …, 2009 | 4 | 2009 |
Mutent: Dynamic android intent protection with ownership-based key distribution and security contracts PK DS, J Baek, T Bao, Y Shoshitaishvili, AL Doupe, R Wang, GJ Ahn 54th HICSS’54, 7217-7226, 2021 | 3 | 2021 |
Multiple preauthentication schemes based on fast channel switching in public wireless LANs JJ Baek, JS Song, SH Seo 2009 International Conference on Innovations in Information Technology (IIT …, 2009 | 3 | 2009 |
Adaptive context transfer scheme for fast handoff in Proxy Mobile IPv6 JJ Baek, JS Song 2008 The Second International Conference on Next Generation Mobile …, 2008 | 3 | 2008 |
Spacemediator: Leveraging authorization policies to prevent spatial and privacy attacks in mobile augmented reality L Claramunt, C Rubio-Medrano, J Baek, GJ Ahn Proceedings of the 28th ACM Symposium on Access Control Models and …, 2023 | 2 | 2023 |
Systems and methods for blockchain-based automatic key generation J Baek, S Kyung, GJ Ahn US Patent 11,588,631, 2023 | 2 | 2023 |
Targeted Privacy Attacks by Fingerprinting Mobile Apps in LTE Radio Layer J Baek, PKD Soundrapandian, S Kyung, R Wang, Y Shoshitaishvili, ... 2023 53rd Annual IEEE/IFIP International Conference on Dependable Systems …, 2023 | 1 | 2023 |
DyPolDroid: Protecting Users and Organizations from Permission-Abuse Attacks in Android CE Rubio-Medrano, M Hill, LM Claramunt, J Baek, GJ Ahn International Conference On Secure Knowledge Management In Artificial …, 2021 | 1 | 2021 |
Poster: DyPolDroid: User-centered counter-policies against android permission-abuse attacks M Hill, CE Rubio-Medrano, LM Claramunt, J Baek, GJ Ahn 2021 IEEE European Symposium on Security and Privacy (EuroS&P), 704-706, 2021 | 1 | 2021 |
Mutent: Dynamic android intent protection with ownership-based key distribution and security contracts PK Duraisamy Soundrapandian, T Bao, J Baek, Y Shoshitaishvili, ... | 1 | 2021 |
Empirical Analysis of Security Protocol in Mobile VoIP System H Park, C Xuemei, G Chu, J Baek, JS Song International Conference on Information Security and Artificial …, 2010 | 1 | 2010 |
Systems and methods for a policy-governed content mediation model for mobile augmented reality applications C Rubio-Medrano, L Claramunt, J Baek, GJ Ahn US Patent App. 18/461,421, 2024 | | 2024 |